Difference between revisions of "Template:Article of the week"

From LIMSWiki
Jump to navigationJump to search
(Updated article of the week text.)
(Updated article of the week text)
Line 1: Line 1:
<!--<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:List1 Stocker DataSciJourn 19-1.png|240px]]</div> //-->
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig2 Rantos Computers2020 9-1.png|240px]]</div>
'''"[[Journal:Data without software are just numbers|Data without software are just numbers]]"'''
'''"[[Journal:Interoperability challenges in the cybersecurity information sharing ecosystem|Interoperability challenges in the cybersecurity information sharing ecosystem]]"'''


Great strides have been made to encourage researchers to [[Archival informatics|archive]] data created by research and provide the necessary systems to support their storage. Additionally, it is recognized that data are meaningless unless their provenance is preserved, through appropriate [[metadata]]. Alongside this is a pressing need to ensure the [[Software quality|quality]] and archiving of the software that generates data, through simulation and control of experiment or data collection, and that which [[Data analysis|analyzes]], modifies, and draws value from raw data. In order to meet the aims of reproducibility, we argue that [[Information management|data management]] alone is insufficient: it must be accompanied by [[Systems development life cycle|good software practices]], the training to facilitate it, and the support of stakeholders, including appropriate recognition for software as a research output. ('''[[Journal:Data without software are just numbers|Full article...]]''')<br />
Threat intelligence helps businesses and organizations make the right decisions in their fight against cyber threats, and strategically design their digital defenses for an optimized and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing [[information]], accompanied by data, on existing and emerging cyber threats and vulnerabilities affecting corporate networks. This paper addresses challenges that organizations are bound to face when they decide to invest in effective and interoperable [[cybersecurity]] information sharing, and it categorizes them in a layered model. Based on this, it provides an evaluation of existing sources that share cybersecurity information. The aim of this research is to help organizations improve their cyber threat information exchange capabilities, to enhance their security posture and be more prepared against emerging threats. ('''[[Journal:Interoperability challenges in the cybersecurity information sharing ecosystem|Full article...]]''')<br />
<br />
<br />
''Recently featured'':
''Recently featured'':
: ▪ [[Journal:Data without software are just numbers|Data without software are just numbers]]
: ▪ [[Journal:Persistent identification of instruments|Persistent identification of instruments]]
: ▪ [[Journal:Persistent identification of instruments|Persistent identification of instruments]]
: ▪ [[Journal:Cannabis contaminants limit pharmacological use of cannabidiol|Cannabis contaminants limit pharmacological use of cannabidiol]]
: ▪ [[Journal:Cannabis contaminants limit pharmacological use of cannabidiol|Cannabis contaminants limit pharmacological use of cannabidiol]]
: ▪ [[Journal:Development of an informatics system for accelerating biomedical research|Development of an informatics system for accelerating biomedical research]]

Revision as of 16:03, 11 October 2021

Fig2 Rantos Computers2020 9-1.png

"Interoperability challenges in the cybersecurity information sharing ecosystem"

Threat intelligence helps businesses and organizations make the right decisions in their fight against cyber threats, and strategically design their digital defenses for an optimized and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing information, accompanied by data, on existing and emerging cyber threats and vulnerabilities affecting corporate networks. This paper addresses challenges that organizations are bound to face when they decide to invest in effective and interoperable cybersecurity information sharing, and it categorizes them in a layered model. Based on this, it provides an evaluation of existing sources that share cybersecurity information. The aim of this research is to help organizations improve their cyber threat information exchange capabilities, to enhance their security posture and be more prepared against emerging threats. (Full article...)

Recently featured:

Data without software are just numbers
Persistent identification of instruments
Cannabis contaminants limit pharmacological use of cannabidiol